{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6287","assignerOrgId":"f7d6281c-4801-44ce-ace2-493291dedb0f","state":"PUBLISHED","assignerShortName":"Checkmk","dateReserved":"2023-11-24T14:13:16.514Z","datePublished":"2023-11-27T14:04:01.568Z","dateUpdated":"2024-08-26T09:47:54.792Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Checkmk Appliance","vendor":"Checkmk GmbH","versions":[{"lessThan":"1.6.8","status":"affected","version":"0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.8 allows local attacker to retrieve passwords via reading log files."}],"impacts":[{"capecId":"CAPEC-37","descriptions":[{"lang":"en","value":"CAPEC-37 Retrieve Embedded Sensitive Data"}]}],"metrics":[{"cvssV3_1":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-598","description":"CWE-598: Use of GET Request Method With Sensitive Query Strings","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f7d6281c-4801-44ce-ace2-493291dedb0f","shortName":"Checkmk","dateUpdated":"2024-08-26T09:47:54.792Z"},"references":[{"url":"https://checkmk.com/werk/9554"}],"title":"Backup password in GET parameter"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:28:21.291Z"},"title":"CVE Program Container","references":[{"url":"https://checkmk.com/werk/9554","tags":["x_transferred"]}]}]}}